The practical guide to HIPAA privacy and security compliance / Rebecca Herold, Kevin Beaver.
"Updated and revised, with several new sections, this one-stop resource for HIPAA privacy and security provides immediately applicable advice for any organization's unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It des...
Saved in:
Online Access: |
Full Text (via Skillsoft) |
---|---|
Main Authors: | , |
Other title: | HIPAA privacy and security compliance |
Format: | Electronic eBook |
Language: | English |
Published: |
Boca Raton :
Auerbach Publications,
[2015]
|
Edition: | Second edition. |
Subjects: |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | b12292266 | ||
005 | 20231215081412.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 141007t20152015lau ob 001 0 eng d | ||
016 | 7 | |a 016966404 |2 Uk | |
019 | |a 897069474 |a 897886020 |a 1197018339 | ||
020 | |a 9781439855591 |q (electronic bk.) | ||
020 | |a 1439855595 |q (electronic bk.) | ||
020 | |z 9781439855584 |q (hardback) | ||
020 | |z 1439855587 |q (hardback) | ||
029 | 1 | |a AU@ |b 000056051564 | |
029 | 1 | |a AU@ |b 000065156490 | |
029 | 1 | |a AU@ |b 000070349485 | |
029 | 1 | |a CHNEW |b 000886524 | |
029 | 1 | |a CHVBK |b 374454434 | |
029 | 1 | |a DEBBG |b BV043606676 | |
029 | 1 | |a DEBSZ |b 42291732X | |
029 | 1 | |a DEBSZ |b 431510814 | |
029 | 1 | |a GBVCP |b 810001780 | |
035 | |a (OCoLC)sks892491827 | ||
035 | |a (OCoLC)892491827 |z (OCoLC)897069474 |z (OCoLC)897886020 |z (OCoLC)1197018339 | ||
037 | |a sks47252 | ||
040 | |a VLB |b eng |e rda |e pn |c VLB |d VLB |d YDXCP |d N$T |d OCLCQ |d OCLCF |d UKMGB |d S4S |d EBLCP |d DEBSZ |d MERUC |d OCLCQ |d YDX |d OCLCQ |d AJS |d K6U |d OCLCO |d OCLCQ |d SFB |d OCLCQ |d OCLCO |d OCLCL | ||
043 | |a n-us--- | ||
049 | |a GWRE | ||
050 | 4 | |a KF3827.R4 |b B43 2015eb | |
084 | |a BUS041000 |a COM032000 |a COM053000 |2 bisacsh | ||
100 | 1 | |a Herold, Rebecca, |e author. | |
245 | 1 | 4 | |a The practical guide to HIPAA privacy and security compliance / |c Rebecca Herold, Kevin Beaver. |
246 | 3 | 0 | |a HIPAA privacy and security compliance |
250 | |a Second edition. | ||
264 | 1 | |a Boca Raton : |b Auerbach Publications, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (xxx, 514 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
520 | |a "Updated and revised, with several new sections, this one-stop resource for HIPAA privacy and security provides immediately applicable advice for any organization's unique situation. It defines what HIPAA is, what it requires, and what can be done to achieve and maintain compliance. It describes the HIPAA Privacy and Security Rules and compliance tasks in easy-to-understand language and enables organizations to determine how HIPAA will impact them. Anyone preparing an organization for HIPAA laws will receive expert guidance on requirements and other commonly-discussed topics"-- |c Provided by publisher | ||
520 | |a "Preface Introduction to this Book The Practical Guide to HIPAA Privacy and Security Compliance is designed to help you understand what the Health Insurance Portability and Accountability Act (HIPAA) is about, what it requires, what you can do to work toward compliance, and how you can maintain compliance on an ongoing basis. We have designed this book to be the one stop "how-to" practical reference for real-world HIPAA privacy and security advice that you can immediately apply to your organization's unique and specific situation, based upon the authors' actual experiences helping hundreds of covered entities (CEs) and business associates (BAs) to meet HIPAA compliance. This book describes the HIPAA Privacy and Security Rules and compliance tasks in easy to understand language. Although we provide actual definitions and passages from the regulatory text where appropriate, instead of focusing on technical and legal theory and jargon, we lay out what you actually need to do according to the final HIPAA Privacy and Security Rules, as well as the Health Information Technology for Economic and Clinical Health Act and the changes that came with the 2013 Omnibus Rule, to become compliant. All these HIPAArelated requirements are very complex. Privacy and security are also very complex. Given that, we don't claim to have coverage in this book AU: Is it"-- |c Provided by publisher | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Online resource; title from PDF title page (viewed 10/7/14). | |
505 | 0 | |a Front Cover; Contents; Foreword; Preface; Authors ; Chapter 1: Introduction to HIPAA; Chapter 2: Related Regulations, Laws, Standards, and Guidance; Chapter 3: Preparing for HIPAA, HITECH, and Other Compliance Changes; Chapter 4: HIPAA Cost Considerations; Chapter 5: Relationship between Security and Privacy; Chapter 6: HIPAA Privacy Rule Requirements Overview; Chapter 7: Performing a Privacy Rule Gap Analysis and Risk Analysis; Chapter 8: Writing Effective Privacy Policies; Chapter 9: State Preemption; Chapter 10: Crafting a Privacy Implementation Plan. | |
505 | 8 | |a Chapter 11: Privacy Rule Compliance ChecklistChapter 12: Security Rule Requirements Overview; Chapter 13: Performing a Security Rule Risk Analysis; Chapter 14: Writing Effective Information Security Policies; Chapter 15: Crafting a Security Implementation Plan; Chapter 16: Security Rule Compliance Checklist; Chapter 17: Health Care Provider Issues; Chapter 18: Health Care Clearinghouse Issues; Chapter 19: Health Plan Issues; Chapter 20: Employer Issues; Chapter 21: Business Associate Issues; Chapter 22: Building a HIPAA-Compliant Technology Infrastructure. | |
505 | 8 | |a Chapter 23: Crafting Security Incident Procedures and Contingency PlansChapter 24: Outsourcing Information Technology Services; Chapter 25: HIPAA Training, Education, and Awareness; Chapter 26: Performing Ongoing HIPAA Compliance Reviews and Audits; Appendix A: Enforcement and Sanctions; Appendix B: HIPAA Glossary; Appendix C: Model Incident and Privacy Response Procedures; Appendix D: HIPAA Resources; References; Further Reading; Back Cover. | |
650 | 0 | |a Medical records |x Law and legislation |z United States. | |
650 | 0 | |a Medical records |x Access control |z United States. | |
650 | 0 | |a Medical care |x Security measures |z United States. | |
650 | 0 | |a Health insurance continuation coverage |z United States. | |
650 | 7 | |a Health insurance continuation coverage |2 fast | |
650 | 7 | |a Medical care |x Security measures |2 fast | |
650 | 7 | |a Medical records |x Access control |2 fast | |
650 | 7 | |a Medical records |x Law and legislation |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Beaver, Kevin, |e author. | |
775 | 0 | 8 | |i Revision of: |a Beaver, Kevin. |t Practical guide to HIPAA privacy and security compliance. |d Boca Raton : Auerbach Publications, ©2004 |z 0849319536 |w (DLC) 2003057900 |
776 | 0 | 8 | |i Print version |z 9781439855584 |
856 | 4 | 0 | |u https://ucblibraries.skillport.com/skillportfe/main.action?assetid=47252 |z Full Text (via Skillsoft) |
915 | |a - | ||
956 | |a Skillsoft BusinessPro | ||
956 | |b Skillsoft BusinessPro Skillport Collection | ||
994 | |a 92 |b COD | ||
998 | |b Subsequent record output | ||
999 | f | f | |i f93fabd0-333b-5834-94cb-859886f191cb |s 0643141e-cfb9-5b43-8a28-843816441067 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e KF3827.R4 B43 2015eb |h Library of Congress classification |i web |n 1 |